| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| GET / WETH | uniswap_v2 | 0x2680...4107 | 0.045488276493643 |
| GET / WETH | sushiswap | 0xbb19...21b2 | 0.0452442569677929 |
| GET / WETH 1% | uniswap_v3 | 0x0246...4ada | 0.2505733723 |
| GET / ETH 1% | uniswap-v4-ethereum | 0x3a2b...4514 | 0.2302930215 |
| GET / WETH | orion-ethereum | 0xdb4b...74d8 | 0.08831301668 |
| GET / UNI 1% | uniswap_v3 | 0x4a7e...a315 | 1.077062752974859619275555433952 |
| GET / USDC 1% | uniswap_v3 | 0x0358...464b | 1.39476968144323708408239555338 |
| GET / LINK | uniswap_v2 | 0x00e3...b685 | 1.27723456339271 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.